word-cloud-generator
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (MEDIUM): The skill provides methods
WordCloudGenerator.from_file(),wc.shape(mask=...), andwc.font()that accept file paths without validation. An attacker could provide paths to sensitive files (e.g.,~/.ssh/id_rsaor.env) to have their contents processed and potentially leaked through the word cloud output or theget_frequencies()method. - [Indirect Prompt Injection] (MEDIUM): The skill is designed to ingest and process untrusted external data (text files) to generate summaries or visualizations.
- Ingestion points:
from_fileandmaskparameters inSKILL.md. - Boundary markers: None. The skill processes all file content as valid input data.
- Capability inventory: File system read access, file system write access via
save(), and data transformation. - Sanitization: No sanitization of input text or file paths is mentioned or implemented.
- [Unverifiable Dependencies] (LOW): The skill relies on several external Python packages (
wordcloud,matplotlib,Pillow,numpy). While these are standard and widely used libraries, they are listed without specific version pinning in some examples, though therequirements.txtprovides minimum versions.
Audit Metadata